Cyber security [electronic resource] : second International Symposium, CSS 2015, Coeur d'Alene, ID, USA, April 7-8, 2015, Revised selected papers / Kristin Haltinner, Dilshani Sarathchandra, Jim Alves-Foss, Kevin Chang, Daniel Conte de Leon, Jia Song (eds.).
2016
QA76.9.A25
Linked e-resources
Linked Resource
Concurrent users
Unlimited
Authorized users
Authorized users
Document Delivery Supplied
Can lend chapters, not whole ebooks
Details
Title
Cyber security [electronic resource] : second International Symposium, CSS 2015, Coeur d'Alene, ID, USA, April 7-8, 2015, Revised selected papers / Kristin Haltinner, Dilshani Sarathchandra, Jim Alves-Foss, Kevin Chang, Daniel Conte de Leon, Jia Song (eds.).
ISBN
9783319283135 (electronic book)
3319283138 (electronic book)
9783319283128
3319283138 (electronic book)
9783319283128
Published
Cham : Springer, 2016.
Language
English
Description
1 online resource (ix, 143 pages) : color illustrations.
Item Number
10.1007/978-3-319-28313-5 doi
Call Number
QA76.9.A25
Dewey Decimal Classification
005.8
Summary
This book constitutes the refereed proceedings of the Second International Symposium on Cyber Security, CSS 2015, held in Coeur d'Alene, ID, USA, in April 2015. The 9 revised full papers presented were carefully reviewed and selected from 20 papers. The papers reflect four areas of scholarly work: permissions and trust evaluation, implementation and management; cloud and device security and privacy; social implications of networked and mobile applications; system and process assessments for improved cybersecurity.
Note
Includes author index.
Access Note
Access limited to authorized users.
Source of Description
Online resource; title from PDF title page (SpringerLink, viewed January 15, 2016).
Added Author
Series
Communications in computer and information science ; 589.
Available in Other Form
Print version: 9783319283128
Linked Resources
Record Appears in
Table of Contents
Permissions and trust evaluation, implementation and management
Cloud and device security and privacy
Social implications of networked and mobile applications.-System and process assessments for improved cybersecurity.
Cloud and device security and privacy
Social implications of networked and mobile applications.-System and process assessments for improved cybersecurity.